Cisco Releases Security Advisories for Critical Vulnerabilities in Identity Services Engine
An authenticated attacker could exploit the vulnerabilities to achieve remote code execution
Summary
An authenticated attacker could exploit the vulnerabilities to achieve remote code execution
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
Cisco has released two security advisories to address a four vulnerabilities in Cisco Identity Services Engine (ISE). Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system.
- CVE-2026-20147 - 'Improper Neutralization of Special Elements used in a Command' vulnerability - CVSS v3.1 Base Score: 9.9
- CVE-2026-20148 - 'Improper Limitation of a Pathname to a Restricted Directory' vulnerability - CVSS v3.1 Base Score: 4.9
- CVE-2026-20186 - 'Improper Neutralization of Special Elements used in a Command' vulnerability - CVSS v3.1 Base Score: 9.9
- CVE-2026-20180 - 'Improper Limitation of a Pathname to a Restricted Directory' vulnerability - CVSS v3.1 Base Score: 9.9
Remediation advice
Affected organisations are strongly encouraged to review Cisco Security Advisories cisco‑sa‑ise‑rce‑traversal‑8bYndVrZ and cisco-sa-ise-rce-4fverepv, and apply the relevant software updates as soon as possible
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 16 April 2026 2:03 pm